Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 14:08
Static task
static1
Behavioral task
behavioral1
Sample
39350f1e07377b2e137d5b675f2ae6f0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
39350f1e07377b2e137d5b675f2ae6f0.exe
Resource
win10v2004-20231215-en
General
-
Target
39350f1e07377b2e137d5b675f2ae6f0.exe
-
Size
3.6MB
-
MD5
39350f1e07377b2e137d5b675f2ae6f0
-
SHA1
e28004672640158dd23b18ac324882eedec6fce1
-
SHA256
3298d295282e6eb49356e08f55a19ccbd459b78e5a6003aa97d181fd46504303
-
SHA512
3b920669b59ce8962c2c1167a23b2ce5ab92177f29702ae192dc3c2e90642e3500055e03f88f4f19369723f5024e1113b6421fe960666671e0235c87386fd640
-
SSDEEP
98304:/LtxIGkUF4G/InbtqUxvtxV2zVy36REGL3oHPuHf:iUF4TbcUxVmU36RloHPQf
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2848 netsh.exe -
Stops running service(s) 3 TTPs
-
Uses Session Manager for persistence 2 TTPs 3 IoCs
Creates Session Manager registry key to run executable early in system boot.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SESSION MANAGER\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Session Manager\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SESSION MANAGER\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows32 = "C:\\windows\\system\\system.exe" 39350f1e07377b2e137d5b675f2ae6f0.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\autoconvv.RRI 39350f1e07377b2e137d5b675f2ae6f0.exe File opened for modification \??\c:\windows\SysWOW64\autoconvv.RRI 39350f1e07377b2e137d5b675f2ae6f0.exe File created C:\Windows\SysWOW64\reg_0001.txt 39350f1e07377b2e137d5b675f2ae6f0.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\system32AntiDelete 39350f1e07377b2e137d5b675f2ae6f0.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2000 sc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2036 39350f1e07377b2e137d5b675f2ae6f0.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2000 2036 39350f1e07377b2e137d5b675f2ae6f0.exe 28 PID 2036 wrote to memory of 2000 2036 39350f1e07377b2e137d5b675f2ae6f0.exe 28 PID 2036 wrote to memory of 2000 2036 39350f1e07377b2e137d5b675f2ae6f0.exe 28 PID 2036 wrote to memory of 2000 2036 39350f1e07377b2e137d5b675f2ae6f0.exe 28 PID 2036 wrote to memory of 2672 2036 39350f1e07377b2e137d5b675f2ae6f0.exe 37 PID 2036 wrote to memory of 2672 2036 39350f1e07377b2e137d5b675f2ae6f0.exe 37 PID 2036 wrote to memory of 2672 2036 39350f1e07377b2e137d5b675f2ae6f0.exe 37 PID 2036 wrote to memory of 2672 2036 39350f1e07377b2e137d5b675f2ae6f0.exe 37 PID 2036 wrote to memory of 2356 2036 39350f1e07377b2e137d5b675f2ae6f0.exe 36 PID 2036 wrote to memory of 2356 2036 39350f1e07377b2e137d5b675f2ae6f0.exe 36 PID 2036 wrote to memory of 2356 2036 39350f1e07377b2e137d5b675f2ae6f0.exe 36 PID 2036 wrote to memory of 2356 2036 39350f1e07377b2e137d5b675f2ae6f0.exe 36 PID 2036 wrote to memory of 2724 2036 39350f1e07377b2e137d5b675f2ae6f0.exe 34 PID 2036 wrote to memory of 2724 2036 39350f1e07377b2e137d5b675f2ae6f0.exe 34 PID 2036 wrote to memory of 2724 2036 39350f1e07377b2e137d5b675f2ae6f0.exe 34 PID 2036 wrote to memory of 2724 2036 39350f1e07377b2e137d5b675f2ae6f0.exe 34 PID 2036 wrote to memory of 2848 2036 39350f1e07377b2e137d5b675f2ae6f0.exe 30 PID 2036 wrote to memory of 2848 2036 39350f1e07377b2e137d5b675f2ae6f0.exe 30 PID 2036 wrote to memory of 2848 2036 39350f1e07377b2e137d5b675f2ae6f0.exe 30 PID 2036 wrote to memory of 2848 2036 39350f1e07377b2e137d5b675f2ae6f0.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\39350f1e07377b2e137d5b675f2ae6f0.exe"C:\Users\Admin\AppData\Local\Temp\39350f1e07377b2e137d5b675f2ae6f0.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\sc.exesc delete GbpSv2⤵
- Launches sc.exe
PID:2000
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram C:\windows\system\system.exe RPCCC2⤵
- Modifies Windows Firewall
PID:2848
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:2724
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\ControlSet002\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:2356
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\ControlSet001\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2